首页 | 本学科首页   官方微博 | 高级检索  
     检索      

XEN虚拟机分析
引用本文:薛海峰,卿斯汉,张焕国.XEN虚拟机分析[J].系统仿真学报,2007,19(23):5556-5558,5569.
作者姓名:薛海峰  卿斯汉  张焕国
作者单位:1. 武汉大学计算机学院,湖北,武汉,430072
2. 中国科学院软件研究所,北京,100080
基金项目:北京市自然科学基金;国家自然科学基金;国家重点基础研究发展计划(973计划)
摘    要:硬件计算能力的极大提高重新激发了人们研究虚拟机软件的热情。XEN虚拟机是目前业界广泛看好的一款开源的虚拟机管理软件,它具有良好的体系结构和优越的性能。随着虚拟机的应用,会出现新的安全问题。介绍了XEN虚拟机的系统结构,重点探讨了基于IntelVT-x的硬件虚拟技术,从处理器管理、内存管理和设备管理三个方面阐释了XEN虚拟机的基本工作原理及其实现的关黻术;在此基础之上,探讨了XEN虚拟机的安全问题并提出了一些安全措施。

关 键 词:虚拟机  安全
文章编号:1004-731X(2007)23-5556-03
收稿时间:2006-09-22
修稿时间:2006-12-05

Analysis on XEN Virtualization Machine
XUE Hai-feng,QING Si-han,ZHANG Huan-guo.Analysis on XEN Virtualization Machine[J].Journal of System Simulation,2007,19(23):5556-5558,5569.
Authors:XUE Hai-feng  QING Si-han  ZHANG Huan-guo
Abstract:The great improvement of the hardware computing capability has stimulated people's enthusiasm to study virtual machine monitor again. XEN is an open-source virtualization machine monitor, whose future is widespread optimistic by the industry. It has a good system architecture and surprising performance. Companying With the application of the virtual machine, there are some new security challenges to be proposed. The hardware virtualization technology was interpreted based on Intel's VT-x technology and the essences of XEN from the prospects of processor, memory and device managements were analyzed. Based on the above analysis, the security of XEN was discussed and some solution schema against security flaws was proposed.
Keywords:XEN  VT-x
本文献已被 CNKI 维普 万方数据 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号